skip to main content
research-article

AquaKey: Exploiting the Randomness of the Underwater Visible Light Communication Channel for Key Extraction

Published: 06 March 2024 Publication History

Editorial Notes

The authors have requested minor, non-substantive changes to the Version of Record and, in accordance with ACM policies, a Corrected Version of Record was published on June 28, 2024. For reference purposes, the VoR may still be accessed via the Supplemental Material section on this page.

Abstract

Underwater Visible Light Communication (UVLC) is promising due to its relatively strong penetration capability in water and large frequency bandwidth. Visible Light Communication (VLC) is also considered a safer wireless communication paradigm as light signals can be constrained within the area of interest with obstacles such as walls, reducing the chance of potential attack. However, this intuitional security assumption is not true anymore in underwater environment. Recent research shows that the eavesdropping risk of UVLC is more severe than we thought, attributed to the divergence and scattering effects of light beams in water. In this paper, we harness the dynamic nature of underwater environments as a true random resource to extract symmetric keys for UVLC. Specifically, the proposed AquaKey system incorporates instantaneous bidirectional channel probing, computation of relative channel characteristics, and an environment-adaptive quantization algorithm. The above design addresses unique challenges caused by the dynamic underwater environment, including self-interference, high-frequency disturbance, and mismatch, ensuring the practicality and applicability of AquaKey. Additionally, AquaKey has negligible impact on communication and has no effect on the illumination function. Through extensive real-world experiments, we show that AquaKey can achieve reliable key extraction with cheap hardware, generating a 512-bit key in just 0.5-1 seconds.

Supplemental Material

PDF File - VoR for "AquaKey: Exploiting the Randomness of the Underwater Visible Light Communication Channel for Key Extraction"
Version of Record for "AquaKey: Exploiting the Randomness of the Underwater Visible Light Communication Channel for Key Extraction" by Zhang et al., Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, Volume 8, Issue 1 (IMWUT 8:1).

References

[1]
S. Aboagye, A. R. Ndjiongue, T. M. Ngatched, O. A. Dobre, and H. V. Poor. Ris-assisted visible light communication systems: A tutorial. IEEE Communications Surveys & Tutorials, 2022.
[2]
S. T. Ali, V. Sivaraman, and D. Ostry. Eliminating reconciliation cost in secret key generation for body-worn health monitoring devices. IEEE Transactions on Mobile Computing, 13(12):2763--2776, 2013.
[3]
W. Aman, S. Al-Kuwari, M. Muzzammil, M. M. U. Rahman, and A. Kumar. Security of underwater and air--water wireless communication: State-of-the-art, challenges and outlook. Ad Hoc Networks, 142:103114, 2023.
[4]
M. A. Arfaoui, M. D. Soltani, I. Tavakkolnia, A. Ghrayeb, M. Safari, C. M. Assi, and H. Haas. Physical layer security for visible light communication systems: A survey. IEEE Communications Surveys & Tutorials, 22(3):1887--1908, 2020.
[5]
S. Arnon. Underwater optical wireless communication network. Optical Engineering, 49(1):015001--015001, 2010.
[6]
G. Blinowski. Security of visible light communication systems---a survey. Physical Communication, 34:246--260, 2019.
[7]
R. Bloom, M. Zuniga, Q. Wang, and D. Giustiniano. Tweeting with sunlight: Encoding data on mobile objects. In IEEE INFOCOM 2019-IEEE Conference on Computer Communications, pages 1324--1332. IEEE, 2019.
[8]
Y. Cao, Y. Zhao, Q. Wang, J. Zhang, S. X. Ng, and L. Hanzo. The evolution of quantum key distribution networks: On the road to the qinternet. IEEE Communications Surveys & Tutorials, 24(2):839--894, 2022.
[9]
J. Classen, D. Steinmetzer, and M. Hollick. Opportunities and pitfalls in securing visible light communication on the physical layer. In Proceedings of the 3rd workshop on visible light communication systems, pages 19--24, 2016.
[10]
Y. Dodis, L. Reyzin, and A. Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In Advances in Cryptology-EUROCRYPT 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004. Proceedings 23, pages 523--540. Springer, 2004.
[11]
G. D. Durgin. Space-time wireless channels. Prentice Hall Professional, 2003.
[12]
K. Enhos, E. Demirors, D. Unal, and T. Melodia. Software-defined visible light networking for bi-directional wireless communication across the air-water interface. In 2021 18th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), pages 1--9, 2021.
[13]
A. Galisteo, D. Juara, and D. Giustiniano. Research in visible light communication systems with openvlc1. 3. In 2019 IEEE 5th World Forum on Internet of Things (WF-IoT), pages 539--544. IEEE, 2019.
[14]
J. Gao, W. Xu, S. Kanhere, S. Jha, J. Y. Kim, W. Huang, and W. Hu. A novel model-based security scheme for lora key generation. In Proceedings of the 20th International Conference on Information Processing in Sensor Networks (co-located with CPS-IoT Week 2021), pages 47--61, 2021.
[15]
F. R. Gfeller and U. Bapst. Wireless in-house data communication via diffuse infrared radiation. Proceedings of the IEEE, 67(11):1474--1486, 1979.
[16]
S. Hessien, S. C. Tokgöz, N. Anous, A. Boyacı, M. Abdallah, and K. A. Qaraqe. Experimental evaluation of ofdm-based underwater visible light communication system. IEEE Photonics Journal, 10(5):1--13, 2018.
[17]
P. A. Hoeher, J. Sticklus, and A. Harlakin. Underwater optical wireless communications in swarm robotics: A tutorial. IEEE Communications Surveys & Tutorials, 23(4):2630--2659, 2021.
[18]
Q. Hu, C. Gong, T. Lin, J. Luo, and Z. Xu. Secrecy performance analysis for water-to-air visible light communication. Journal of Lightwave Technology, 40(14):4607--4620, 2022.
[19]
M. V. Jamali, A. Mirani, A. Parsay, B. Abolhassani, P. Nabavi, A. Chizari, P. Khorramshahi, S. Abdollahramezani, and J. A. Salehi. Statistical studies of fading in underwater wireless optical channels in the presence of air bubble, temperature, and salinity random variations. IEEE Transactions on Communications, 66(10):4706--4723, 2018.
[20]
S. Jana, S. N. Premnath, M. Clark, S. K. Kasera, N. Patwari, and S. V. Krishnamurthy. On the effectiveness of secret key extraction from wireless signal strength in real environments. In Proceedings of the 15th annual international conference on Mobile computing and networking, pages 321--332, 2009.
[21]
N. Jiang, A. Zhao, C. Xue, J. Tang, and K. Qiu. Physical secure optical communication based on private chaotic spectral phase encryption/decryption. Optics letters, 44(7):1536--1539, 2019.
[22]
J. M. Kahn and J. R. Barry. Wireless infrared communications. Proceedings of the IEEE, 85(2):265--298, 1997.
[23]
E. Klaoudatou, E. Konstantinou, G. Kambourakis, and S. Gritzalis. A survey on cluster-based group key agreement protocols for wsns. IEEE Communications surveys & tutorials, 13(3):429--442, 2010.
[24]
M. Kong, J. Wang, Y. Chen, T. Ali, R. Sarwar, Y. Qiu, S. Wang, J. Han, and J. Xu. Security weaknesses of underwater wireless optical communication. Optics Express, 25(18):21509--21518, 2017.
[25]
H. Kulhandjian, T. Melodia, and D. Koutsonikolas. Securing underwater acoustic communications through analog network coding. In 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), pages 266--274. IEEE, 2014.
[26]
Z. Li, Q. Pei, I. Markwood, Y. Liu, and H. Zhu. Secret key establishment via rss trajectory matching between wearable devices. IEEE Transactions on Information Forensics and security, 13(3):802--817, 2017.
[27]
C. Lin, Y. Yu, J. Xiong, Y. Zhang, L. Wang, G. Wu, and Z. Luo. Shrimp: a robust underwater visible light communication system. In Proceedings of the 27th Annual International Conference on Mobile Computing and Networking, pages 134--146, 2021.
[28]
H. Liu, Y. Wang, J. Yang, and Y. Chen. Fast and practical secret key extraction by exploiting channel response. In 2013 Proceedings IEEE INFOCOM, pages 3048--3056. IEEE, 2013.
[29]
X. Liu, L. Wang, J. Xiong, C. Lin, X. Gao, J. Li, and Y. Wang. Uqrcom: Underwater wireless communication based on qr code. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 6(4):1--22, 2023.
[30]
H.-K. Lo, M. Curty, and K. Tamaki. Secure quantum key distribution. Nature Photonics, 8(8):595--604, 2014.
[31]
Y. Lu, F. Wu, S. Tang, L. Kong, and G. Chen. Free: A fast and robust key extraction mechanism via inaudible acoustic signal. In Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing, pages 311--320, 2019.
[32]
S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In Proceedings of the 14th ACM international conference on Mobile computing and networking, pages 128--139, 2008.
[33]
J. V. D. Merwe, D. Dawoud, and S. McDonald. A survey on peer-to-peer key management for mobile ad hoc networks. ACM computing surveys (CSUR), 39(1):1--es, 2007.
[34]
N. Patwari, J. Croft, S. Jana, and S. K. Kasera. High-rate uncorrelated bit extraction for shared secret key generation from channel measurements. IEEE Transactions on Mobile Computing, 9(1):17--30, 2009.
[35]
F. Qiu, Z. He, L. Kong, and F. Wu. Magik: An efficient key extraction mechanism based on dynamic geomagnetic field. In IEEE INFOCOM 2017-IEEE Conference on Computer Communications, pages 1--9. IEEE, 2017.
[36]
A. Rukhin, J. Soto, J. Nechvatal, M. Smid, E. Barker, S. Leigh, M. Levenson, M. Vangel, D. Banks, A. Heckert, et al. A statistical test suite for random and pseudorandom number generators for cryptographic applications, volume 22. US Department of Commerce, Technology Administration, National Institute of..., 2001.
[37]
N. Saeed, A. Celik, T. Y. Al-Naffouri, and M.-S. Alouini. Underwater optical wireless communications, networking, and localization: A survey. Ad Hoc Networks, 94:101935, 2019.
[38]
J. B. Saif and M. Younis. Underwater localization using airborne visible light communication links. In 2021 IEEE Global Communications Conference (GLOBECOM), pages 01--06, 2021.
[39]
P. Sajmath and R. V. Ravi. Beamforming based underwater wireless optical communication systems. In 2019 International Conference on Communication and Electronics Systems (ICCES), pages 1289--1293. IEEE, 2019.
[40]
Sonardyne. Bluecomm 100 -- datasheets. https://www.sonardyne.com/products-knowledge-base/bluecomm-100-datasheets/. 2023, Jan 19.
[41]
N. C. Strole. The ibm token-ring network---a functional overview. IEEE Network, 1(1):23--30, 1987.
[42]
Q. Wang and D. Giustiniano. Intra-frame bidirectional transmission in networks of visible leds. IEEE/ACM Transactions on Networking, 24(6):3607--3619, 2016.
[43]
Q. Wang, H. Su, K. Ren, and K. Kim. Fast and scalable secret key generation exploiting channel phase randomness in wireless networks. In 2011 Proceedings IEEE INFOCOM, pages 1422--1430. IEEE, 2011.
[44]
Q. Wang, L. Wang, and L. Zou. Whale-inspired sonar in covert detection. In 2016 IEEE/OES China Ocean Acoustics (COA), pages 1--4. IEEE, 2016.
[45]
B. Wei, W. Xu, K. Li, C. Luo, and J. Zhang. i 2 key: A cross-sensor symmetric key generation system using inertial measurements and inaudible sound. In 2022 21st ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN), pages 183--194. IEEE, 2022.
[46]
T. Xu, M. C. Tapia, and M. Z��iga. Exploiting digital {Micro-Mirror} devices for ambient light communication. In 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22), pages 387--400, 2022.
[47]
W. Xu, Z. Li, W. Xue, X. Yu, B. Wei, J. Wang, C. Luo, W. Li, and A. Y. Zomaya. Inaudiblekey: Generic inaudible acoustic signal based key agreement protocol for mobile devices. In Proceedings of the 20th International Conference on Information Processing in Sensor Networks (co-located with CPS-IoT Week 2021), pages 106--118, 2021.
[48]
W. Xu, J. Zhang, S. Huang, C. Luo, and W. Li. Key generation for internet of things: A contemporary survey. ACM Computing Surveys (CSUR), 54(1):1--37, 2021.
[49]
H. Yang, H. Liu, C. Luo, Y. Wu, W. Li, A. Y. Zomaya, L. Song, and W. Xu. Vehicle-key: A secret key establishment scheme for lora-enabled iov communications. In 2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS), pages 787--797. IEEE Computer Society, 2022.
[50]
Y. Yang, S. Ding, J. Hao, and J. Luo. Roaming in connecting light: Practical visible light communication leveraging led sensing. In Proceedings of the 4th ACM Workshop on Visible Light Communication Systems, pages 9--14, 2017.
[51]
S. Yoon, K. Lee, J. Cha, V. Mariappan, K. Young, D. Woo, and J. Kim. Ieee standard for local and metropolitan area networks---part 15.7: short-range optical wireless communications. IEEE Std, pages 1--407, 2019.
[52]
Z. B. Zabinsky et al. Random search algorithms. Department of Industrial and Systems Engineering, University of Washington, USA, 2009.
[53]
M. Zafer, D. Agrawal, and M. Srivatsa. Limitations of generating a secret key using wireless fading under active adversary. IEEE/ACM Transactions on Networking, 20(5):1440--1451, 2012.
[54]
K. Zeng. Physical layer key generation in wireless networks: challenges and opportunities. IEEE Communications Magazine, 53(6):33--39, 2015.
[55]
Z. Zeng, S. Fu, H. Zhang, Y. Dong, and J. Cheng. A survey of underwater optical wireless communications. IEEE communications surveys & tutorials, 19(1):204--238, 2016.
[56]
H. Zhang and Y. Dong. General stochastic channel model and performance evaluation for underwater wireless optical links. IEEE transactions on wireless communications, 15(2):1162--1173, 2015.
[57]
X. Zhang, Z. Babar, P. Petropoulos, H. Haas, and L. Hanzo. The evolution of optical ofdm. IEEE communications surveys & tutorials, 23(3):1430--1457, 2021.
[58]
X. Zhang, G. Klevering, X. Lei, Y. Hu, L. Xiao, and G.-h. Tu. The security in optical wireless communication: A survey. ACM Computing Surveys, 2023.
[59]
Z. Zhang, Y. Lai, J. Lv, P. Liu, D. Teng, G. Wang, and L. Liu. Over 700 mhz--3 db bandwidth uowc system based on blue hv-led with t-bridge pre-equalizer. IEEE Photonics Journal, 11(3):1--12, 2019.
[60]
S. Zhu, X. Chen, X. Liu, G. Zhang, and P. Tian. Recent progress in and perspectives of underwater wireless optical communication. Progress in Quantum Electronics, 73:100274, 2020.
[61]
X. Zhu, F. Xu, E. Novak, C. C. Tan, Q. Li, and G. Chen. Using wireless link dynamics to extract a secret key in vehicular scenarios. IEEE Transactions on Mobile Computing, 16(7):2065--2078, 2016.

Cited By

View all
  • (2024)Lipwatch: Enabling Silent Speech Recognition on Smartwatches using Acoustic SensingProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36596148:2(1-29)Online publication date: 15-May-2024
  • (2024)Sensing to Hear through MemoryProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36595988:2(1-31)Online publication date: 15-May-2024

Index Terms

  1. AquaKey: Exploiting the Randomness of the Underwater Visible Light Communication Channel for Key Extraction

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
    Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies  Volume 8, Issue 1
    March 2024
    1182 pages
    EISSN:2474-9567
    DOI:10.1145/3651875
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 06 March 2024
    Published in�IMWUT�Volume 8, Issue 1

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Key extraction
    2. Security
    3. Underwater Visible Light Communication

    Qualifiers

    • Research-article
    • Research
    • Refereed

    Data Availability

    VoR for "AquaKey: Exploiting the Randomness of the Underwater Visible Light Communication Channel for Key Extraction": Version of Record for "AquaKey: Exploiting the Randomness of the Underwater Visible Light Communication Channel for Key Extraction" by Zhang et al., Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, Volume 8, Issue 1 (IMWUT 8:1). https://dl.acm.org/doi/10.1145/3643557#3643557-vor.pdf

    Funding Sources

    • National Nature Science Foundation of China

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)241
    • Downloads (Last 6 weeks)66
    Reflects downloads up to 22 Oct 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Lipwatch: Enabling Silent Speech Recognition on Smartwatches using Acoustic SensingProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36596148:2(1-29)Online publication date: 15-May-2024
    • (2024)Sensing to Hear through MemoryProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36595988:2(1-31)Online publication date: 15-May-2024

    View Options

    Get Access

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media